Windows anti-forensics module
☆25Apr 16, 2026Updated this week
Alternatives and similar repositories for Kakia
Users that are interested in Kakia are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆78Jan 1, 2026Updated 3 months ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated last month
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- ☆46Dec 23, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18May 16, 2013Updated 12 years ago
- Covert data exfiltration via DNS☆52Feb 8, 2025Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆216Mar 7, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆20Feb 23, 2026Updated last month
- ☆34Jan 17, 2026Updated 3 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 7 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 7 months ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- ☆116Jan 8, 2025Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Detonate malware on VMs and get logs & detection status☆89Apr 8, 2026Updated last week
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆80Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Updated this week
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆15Jan 7, 2026Updated 3 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆62Apr 4, 2024Updated 2 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- python3 version of cloacked-pixel.☆12Oct 8, 2022Updated 3 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Enumerate active EDR's on the system☆151Sep 23, 2025Updated 6 months ago
- Bash script for performing the logical acquisition of Apple Silicon Mac☆17Jun 21, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12May 13, 2024Updated last year
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Enclosures for Meshtastic devices☆11Aug 13, 2023Updated 2 years ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 6 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 2 months ago
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- A Python Program that uses OpenCV and Scapy module to brute force RTSP (Real Time Streaming Protocol) Service used by IoT (Internet of Th…☆10Oct 31, 2024Updated last year